共 29 条
[1]
[Anonymous], 2013, ARXIV13064447
[2]
Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds
[J].
2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014),
2014,
:464-473
[3]
Large-Scale Machine Learning with Stochastic Gradient Descent
[J].
COMPSTAT'2010: 19TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL STATISTICS,
2010,
:177-186
[4]
Çalik RC, 2018, I C COMP SYST APPLIC
[5]
Deng L., 2012, IEEE Signal Processing Magazine, V29, P141, DOI [DOI 10.1109/MSP.2012.22114772, 10.1109/msp.2012.2211477]
[6]
Garfinkel S. L., 2018, QUEUE, V16, P50, DOI DOI 10.1145/3291276.3295691
[7]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[8]
Geyer R. C., 2017, DIFFERENTIALLY PRIVA
[9]
Hayes J., CSCR170507663 ARXIV
[10]
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:603-618